Abstract: In this paper, a robust digital image watermarking
scheme for copyright protection applications using the singular value
decomposition (SVD) is proposed. In this scheme, an entropy
masking model has been applied on the host image for the texture
segmentation. Moreover, the local luminance and textures of the host
image are considered for watermark embedding procedure to
increase the robustness of the watermarking scheme. In contrast to all
existing SVD-based watermarking systems that have been designed
to embed visual watermarks, our system uses a pseudo-random
sequence as a watermark. We have tested the performance of our
method using a wide variety of image processing attacks on different
test images. A comparison is made between the results of our
proposed algorithm with those of a wavelet-based method to
demonstrate the superior performance of our algorithm.
Abstract: Considering toxicity of heavy metals and their
accumulation in domestic wastes, immobilization of lead and
cadmium is envisaged inside glass-ceramics. We particularly
focused this work on calcium-rich phases embedded in a
glassy matrix.
Glass-ceramics were synthesized from glasses doped with
12 wt% and 16 wt% of PbO or CdO. They were observed and
analyzed by Electron MicroProbe Analysis (EMPA) and
Analytical Scanning Electron Microscopy (ASEM). Structural
characterization of the samples was performed by powder XRay
Diffraction.
Diopside crystals of CaMgSi2O6 composition are shown to
incorporate significant amounts of cadmium (up to 9 wt% of
CdO). Two new crystalline phases are observed with very
high Cd or Pb contents: about 40 wt% CdO for the cadmiumrich
phase and near 60 wt% PbO for the lead-rich phase. We
present complete chemical and structural characterization of
these phases. They represent a promising way for the
immobilization of toxic elements like Cd or Pb since glass
ceramics are known to propose a “double barrier" protection
(metal-rich crystals embedded in a glass matrix) against metal
release in the environment.
Abstract: Reducing the risk of information leaks is one of
the most important functions of identity management systems. To
achieve this purpose, Dey et al. have already proposed an account
management method for a federated login system using a blind
signature scheme. In order to ensure account anonymity for the
authentication provider, referred to as an IDP (identity provider),
a blind signature scheme is utilized to generate an authentication
token on an authentication service and the token is sent to an IDP.
However, there is a problem with the proposed system. Malicious
users can establish multiple accounts on an IDP by requesting such
accounts. As a measure to solve this problem, in this paper, the
authors propose an account checking method that is performed before
account generation.
Abstract: The usage of internet is rapidly increasing and the usage of mobile agent technology in internet environment has a great demand. The security issue one of main obstacles that restrict the mobile agent technology to spread. This paper proposes Secure-Image Mechanism (SIM) as a new mechanism to protect mobile agents against malicious hosts. . SIM aims to protect mobile agent by using the symmetric encryption and hash function in cryptography science. This mechanism can prevent the eavesdropping and alteration attacks. It assists the mobile agents to continue their journey normally incase attacks occurred.
Abstract: In this paper, a new formulation for acoustics coupled with linear elasticity is presented. The primary objective of the work is to develop a three dimensional hp adaptive finite element method code destinated for modeling of acoustics of human head. The code will have numerous applications e.g. in designing hearing protection devices for individuals working in high noise environments. The presented work is in the preliminary stage. The variational formulation has been implemented and tested on a sequence of meshes with concentric multi-layer spheres, with material data representing the tissue (the brain), skull and the air. Thus, an efficient solver for coupled elasticity/acoustics problems has been developed, and tested on high contrast material data representing the human head.
Abstract: In this paper the behavior of fixed series compensated
extra high voltage transmission lines during faults is simulated. Many
over-voltage protection schemes for series capacitors are limited in
terms of size and performance, and are easily affected by
environmental conditions. While the need for more compact and
environmentally robust equipment is required. use of series
capacitors for compensating part of the inductive reactance of long
transmission lines increases the power transmission capacity.
Emphasis is given on the impact of modern capacitor protection
techniques (MOV protection). The simulation study is performed
using MATLAB/SIMULINK®and results are given for a three phase
and a single phase to ground fault.
Abstract: Obfuscation is a low cost software protection
methodology to avoid reverse engineering and re engineering of
applications. Source code obfuscation aims in obscuring the source
code to hide the functionality of the codes. This paper proposes an
Array data transformation in order to obfuscate the source code
which uses arrays. The applications using the proposed data
structures force the programmer to obscure the logic manually. It
makes the developed obscured codes hard to reverse engineer and
also protects the functionality of the codes.
Abstract: In the past many uneconomic solutions for limitation
and interruption of short-circuit currents in low power applications
have been introduced, especially polymer switch based on the
positive temperature coefficient of resistance (PCTR) concept.
However there are many limitations in the active material, which
consists of conductive fillers. This paper presents a significantly
improved and simplified approach that replaces the existing current
limiters with faster switching elements. Its elegance lies in the
remarkable simplicity and low-cost processes of producing the device
using polyaniline (PANI) doped with methane-sulfonic acid (MSA).
Samples characterized as lying in the metallic and critical regimes of
metal insulator transition have been studied by means of electrical
performance in the voltage range from 1V to 5 V under different
environmental conditions. Moisture presence is shown to increase the
resistivity and also improved its current limiting performance.
Additionally, the device has also been studied for electrical resistivity
in the temperature range 77 K-300 K. The temperature dependence of
the electrical conductivity gives evidence for a transport mechanism
based on variable range hopping in three dimensions.
Abstract: The city of Melbourne in Victoria, Australia, provides a number of examples of how a growing city can integrate urban planning and water planning to achieve sustainable urban development, environmental protection, liveability and integrated water management outcomes, and move towards becoming a “Water Sensitive City". Three examples are provided - the development at Botanic Ridge, where a 318 hectare residential development is being planned and where integrated water management options are being implemented using a “triple bottom line" sustainability investment approach; the Toolern development, which will capture and reuse stormwater and recycled water to greatly reduce the suburb-s demand for potable water, and the development at Kalkallo where a 1,200 hectare industrial precinct development is planned which will merge design of the development's water supply, sewerage services and stormwater system. The Paper argues that an integrated urban planning and water planning approach is fundamental to creating liveable, vibrant communities which meet social and financial needs while being in harmony with the local environment. Further work is required on developing investment frameworks and risk analysis frameworks to ensure that all possible solutions can be assessed equally.
Abstract: Intelligent Video-Surveillance (IVS) systems are
being more and more popular in security applications. The analysis
and recognition of abnormal behaviours in a video sequence has
gradually drawn the attention in the field of IVS, since it allows
filtering out a large number of useless information, which guarantees
the high efficiency in the security protection, and save a lot of human
and material resources. We present in this paper ADABeV, an
intelligent video-surveillance framework for event recognition in
crowded scene to detect the abnormal human behaviour. This
framework is attended to be able to achieve real-time alarming,
reducing the lags in traditional monitoring systems. This architecture
proposal addresses four main challenges: behaviour understanding in
crowded scenes, hard lighting conditions, multiple input kinds of
sensors and contextual-based adaptability to recognize the active
context of the scene.
Abstract: Green propellants used for satellite-level propulsion
system become attractive in recent years because the non-toxicity and
lower requirements of safety protection. One of the green propellants,
high-concentration hydrogen peroxide H2O2 solution (≥70% w/w,
weight concentration percentage), often known as high-test peroxide
(HTP), is considered because it is ITAR-free, easy to manufacture and
the operating temperature is lower than traditional monopropellant
propulsion. To establish satellite propulsion technology, the National
Space Organization (NSPO) in Taiwan has initialized a long-term
cooperation project with the National Cheng Kung University to
develop compatible tank and thruster. An experimental propulsion
payload has been allocated for the future self-reliant satellite to
perform orbit transfer and maintenance operations. In the present
research, an 1-Newton thruster prototype is designed and the thrusting
force is measured by a pendulum-type platform. The preliminary
hot-firing test at ambient environment showed the generated thrust and
the specific impulse are about 0.7 Newton and 102 seconds,
respectively.
Abstract: This paper highlights the importance of integrating social and technical approach (which is so called a “hybrid socio-technical approach") as one innovative and strategic program to support the social development in geodisaster prone area in Indonesia. Such program mainly based on public education and community participation as a partnership program by the University, local government and may also with the private company and/ or local NGO. The indigenous, simple and low cost technology has also been introduced and developed as a part of the hybrid sociotechnical system, in order to ensure the life and environmental protection, with respect to the sustainable human and social development.
Abstract: In nature, electromagnetic fields always appear like
atmosphere static electric field, the earth's static magnetic field and
the wide-rang frequency electromagnetic field caused by lightening.
However, besides natural electromagnetic fields (EMF), today human
beings are mostly exposed to artificial electromagnetic fields due to
technology progress and outspread use of electrical devices. To
evaluate nuisance of EMF, it is necessary to know field intensity for
every frequency which appears and compare it with allowed values.
Low frequency EMF-s around transmission and distribution lines are
time-varying quasi-static electromagnetic fields which have
conservative component of low frequency electrical field caused by
charges and eddy component of low frequency magnetic field caused
by currents. Displacement current or field delay are negligible, so
energy flow in quasi-static EMF involves diffusion, analog like heat
transfer. Electrical and magnetic field can be analyzed separately.
This paper analysis the numerical calculations in ELF-400 software
of EMF in distribution substation in shopping center. Analyzing the
results it is possible to specify locations exposed to the fields and
give useful suggestion to eliminate electromagnetic effect or reduce it
on acceptable level within the non-ionizing radiation norms and
norms of protection from EMF.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: In order to upgrade the seismic resistibility of structures and enhance the functionality of an isolator, a new base isolator called the multiple trench friction pendulum system (MTFPS) is proposed in this study. The proposed MTFPS isolator is composed of a trench concave surface and several intermediate sliding plates in two orthogonal directions. Mathematical formulations have been derived to examine the characteristics of the proposed MTFPS isolator possessing multiple intermediate sliding plates. By means of mathematical formulations, it can be inferred that the natural period and damping effect of the MTFPS isolator with several intermediate sliding plates can be altered continually and controllably during earthquakes. Furthermore, results obtained from shaking table tests demonstrate that the proposed isolator provides good protection to structures for prevention of damage from strong earthquakes.
Abstract: As the Internet continues to grow at a rapid pace as
the primary medium for communications and commerce and as
telecommunication networks and systems continue to expand their
global reach, digital information has become the most popular and
important information resource and our dependence upon the
underlying cyber infrastructure has been increasing significantly.
Unfortunately, as our dependency has grown, so has the threat to the
cyber infrastructure from spammers, attackers and criminal
enterprises. In this paper, we propose a new machine learning based
network intrusion detection framework for cyber security. The
detection process of the framework consists of two stages: model
construction and intrusion detection. In the model construction stage,
a semi-supervised machine learning algorithm is applied to a
collected set of network audit data to generate a profile of normal
network behavior and in the intrusion detection stage, input network
events are analyzed and compared with the patterns gathered in the
profile, and some of them are then flagged as anomalies should these
events are sufficiently far from the expected normal behavior. The
proposed framework is particularly applicable to the situations where
there is only a small amount of labeled network training data
available, which is very typical in real world network environments.
Abstract: Advent enhancements in the field of computing have
increased massive use of web based electronic documents. Current
Copyright protection laws are inadequate to prove the ownership for
electronic documents and do not provide strong features against
copying and manipulating information from the web. This has
opened many channels for securing information and significant
evolutions have been made in the area of information security.
Digital Watermarking has developed into a very dynamic area of
research and has addressed challenging issues for digital content.
Watermarking can be visible (logos or signatures) and invisible
(encoding and decoding). Many visible watermarking techniques
have been studied for text documents but there are very few for web
based text. XML files are used to trade information on the internet
and contain important information. In this paper, two invisible
watermarking techniques using Synonyms and Acronyms are
proposed for XML files to prove the intellectual ownership and to
achieve the security. Analysis is made for different attacks and
amount of capacity to be embedded in the XML file is also noticed.
A comparative analysis for capacity is also made for both methods.
The system has been implemented using C# language and all tests are
made practically to get the results.
Abstract: Users of computer systems may often require the
private transfer of messages/communications between parties across
a network. Information warfare and the protection and dominance of
information in the military context is a prime example of an
application area in which the confidentiality of data needs to be
maintained. The safe transportation of critical data is therefore often
a vital requirement for many private communications. However,
unwanted interception/sniffing of communications is also a
possibility. An elementary stealthy transfer scheme is therefore
proposed by the authors. This scheme makes use of encoding,
splitting of a message and the use of a hashing algorithm to verify the
correctness of the reconstructed message. For this proof-of-concept
purpose, the authors have experimented with the random sending of
encoded parts of a message and the construction thereof to
demonstrate how data can stealthily be transferred across a network
so as to prevent the obvious retrieval of data.
Abstract: The scope of this paper is to describe a real electrical
installation of renewable energy using photovoltaic cells. The
displayed power grid connected network was established in 2007 at
area of Northern Greece. The photovoltaic park is composed of 6120
photovoltaic cells able to deliver a total power of 1.101.600 Wp. For
the transformation of DC voltage to AC voltage have been used 25
stand alone three phases inverters and for the connection at the
medium voltage network of Greek Power Authority have been
installed two oil immersed transformer of 630 kVA each one. Due to
the wide space area of installation a specific external lightning
protection system has been designed. Additionally, due to the
sensitive electronics of the control and protection systems of park,
surge protection, equipotent bonding and shielding were also of
major importance.
Abstract: Main goal of preventive healthcare problems are at
decreasing the likelihood and severity of potentially life-threatening
illnesses by protection and early detection. The levels of
establishment and staffing costs along with summation of the travel
and waiting time that clients spent are considered as objectives
functions of the proposed nonlinear integer programming model. In
this paper, we have proposed a bi-objective mathematical model for
designing a network of preventive healthcare facilities so as to
minimize aforementioned objectives, simultaneously. Moreover, each
facility acts as M/M/1 queuing system. The number of facilities to be
established, the location of each facility, and the level of technology
for each facility to be chosen are provided as the main determinants
of a healthcare facility network. Finally, to demonstrate performance
of the proposed model, four multi-objective decision making
techniques are presented to solve the model.